Groups with Complex Modulus*

Total Page:16

File Type:pdf, Size:1020Kb

Groups with Complex Modulus* Int. J. Communications, Network and System Sciences, 2011, 4, 287-296 doi:10.4236/ijcns.2011.45033 Published Online May 2011 (http://www.SciRP.org/journal/ijcns) Protection of Sensitive Messages Based on Quadratic Roots of Gaussians: Groups with Complex Modulus* Boris Verkhovsky Computer Science Department, New Jersey Institute of Technology, University Heights, Newark, USA E-mail: [email protected] Received April 5, 2011; revised May 3, 2011; accepted May 20, 2011 Abstract This paper considers three algorithms for the extraction of square roots of complex integers {called Gaus- sians} using arithmetic based on complex modulus p + iq. These algorithms are almost twice as fast as the analogous algorithms extracting square roots of either real or complex integers in arithmetic based on modulus p, where p is a real prime. A cryptographic system based on these algorithms is provided in this paper. A procedure reducing the computational complexity is described as well. Main results are explained in several numeric illustrations. Keywords: Complex Modulus; Computational Efficiency; Cryptographic Algorithm; Digital Isotopes; Multiplicative Control Parameter; Octadic Roots, Quartic Roots, Rabin Algorithm, Reduction of Complexity, Resolventa, Secure Communication, Square Roots 1. Introduction and Problem Statement Gaussians, and let Gi:1 4 1,4 be the Gaussian modulus. Inside each square there is a number of Gaus- The concept of complex modulus was introduced by C. F. sian integers; plus every vertex of each square is also a Gauss [1]. The set of complex integers is an infinite sys- Gaussian integer. In order to avoid multiple counting of tem of equidistant points located on parallel straight lines, the same vertex, we consider that only the left-most bot- such that the infinite plane is decomposable into infi- tom vertex of each square belongs to that square [1]. For nitely many squares. Analogously, every integer that is more insights and graphics see [2]. divisible by a complex integer m = a + bi forms infini- This paper is a logical continuation of a recently pub- tely many squares, with sides equal to ab22 . lished paper [3], which considered a cryptographic scheme based on complex integers modulo real semi-prime pq. 1.1. Complex Moduli The above mentioned paper describes an extractor of quadratic roots from complex integers called Gaussians. A slightly different approach is considered in [4]. Several Let’s denote ab,: a bi. Associates of Gpq:, general ideas for computation of a square root in modular are –G, iG and –iG; they are the vertices of a square arithmetic are provided in [5-7]. where Gpq, ; iG 0, 1p , q q, p ; This paper considers arithmetic based on complex in- iG 0, 1 p,, q q p . tegers with Gaussian modulus. As demonstrated below, To understand the congruencies, let’s consider a sys- the extraction of square roots in such arithmetic requires tem of integer Cartesian coordinates. The squares on this a smaller number of basic operations. As a result, the system of coordinates are inclined to the former squares described cryptographic system is almost twice faster if neither of integers a, b is equal to zero [1]. Then the than the analogous systems in [3,4]. associates of the modulus pq, are rotations of “vec- Consider quadratic equation tor” pq, on 90 degrees. Let’s consider the plane of complex numbers and as an example, the complex prime x,,modycd2 pq,, (1) number 1, 4 : 1 4i [2]. Let the left-most bottom point of the mesh be the origin of the coordinate system for where modulus Gpq:, is a Gaussian prime; and let 22 *Dedicated to the memory of Samuel A. Verkhovsky. Npqpq:, . (2) Copyright © 2011 SciRes. IJCNS 288 B. VERKHOVSKY 1.2. General Properties lution for w, it implies that uw,1,01 ,0,p q mod G. (8) Proposition 1: Gaussian pq, is a prime if and only if its norm N is a real prime [1]. Hence, if a root x, y is known, then another root of Remark 1: Since pq,, qp, without loss c,d is uw, x,y mo d. G of generality we assume that, if pq, is prime, then p Quartic roots: There are four quartic roots of 1, 0 , 4 is odd and q is even {unless it is stated otherwise}. each satisfying qk 1, 0 : Proposition 2: If norm of pq, is a prime (2), then qq (1,0); ( 1,0); q 0,1 ;q 0, 1 ; (9) for every pq,, N 14 is an integer. 12 3 4 Proof: Let pk:2 1 and q:2 r. Then (2) implies where that 22 qq3,4 2mod Gqq ; 2 1 1,0 mod G . 2 Nkk14 1 r. Q.E.D. (3) 2.2. Quadratic Root Extractor (QRE-1) Proposition 3 {cyclic identity}: If gcdab , , pq , 1,0 and G is a prime, then the following identity holds: Step 1.1: Compute ab,mod,1,N 1 pq 0. (4) Nm:;pq22 :14;NzN 38 (10) Remark 2: More details about identity (4) are provided in the Appendix in Proposition 3.A. Step 2.1: if N is not a prime, then QRE-1 algorithm is Proposition 4 {Modular multiplicative inverse}: if not applicable, na ; Remark 4: gcdab , , pq , 1, 0, then pq1, 1, 0 mod G; (11) ab,,mo12 abN d G. (5) Step 3.1: Compute Remark 3: Yet, more computationally-efficient is to m solve an appropriate Diophantine equation. However, E:, cdmod G; (12) this is beyond the scope of this paper. Step 4.1: if E 0, 1 , then cd, is Gaussian qua- Definition 1: Gaussian x, y is called a quadratic dratic non-residue (GQNR }, i.e. its square root does not root of cd, modulo G if x, y and cd, satisfy exist; Equation (1); we denote it as Step 5.1: if E 1, 0 , then x,:ycd ,modG. (6) N 38 x,:yc ,d m od G; (13) 2. Quadratic Root Extraction Where Step 6.1: if E 1, 0 , then N 5mod8 R : 0, 1 modGG ; RE 1 mod ; (14) z Proposition 5: If pq, is prime and N 5mod8 , x,:yRcdG , mod; (15) then mN:14 is odd. Step 7.1 {2nd square root}: Proof: Notice that q mod 4 2 , otherwise (3) implies that N 1mod8. Q.E.D. tv,: p 1,, q xymodG (11). (16) 2.1. Quadratic and Quartic Roots of 1, 0 2.3. Validation of Algorithm Modulo pq, Proposition 6: Suppose Consider a quadratic root uw, of 1, 0mo d pq , : a) pq, is a prime and q 2mod4; (17) uw,: 1,0mod, pq . N 14 Then uw,2 u22 w,21 uw ,0mod pq,. This b) zN38; Ecd:, md o G; (18) 2 equation holds if either w = 0 and u 1modG; or if 1 u = 0 and c) REEGmod if 1, 0 or 1,0 ; (19) w2 1modG . (7) then z Since the last equation does not have a real integer so- cd,,mo R cdd G . (20) Copyright © 2011 SciRes. IJCNS B. VERKHOVSKY 289 Proof: First of all, (19) implies that Table 1. Quadratic root extraction and verification; N mod 8 = 5 . ER2 mod G 1,0 . (21) Yet, cd, (3, 8) (4, 8) (6, 7) (8, −2) (9, 2) (10, 5) N 34 m cd,R22 cd,,, cdN 14 R cd ER 2cd, (1, 0) (10, −2) (−1, 0) (−1, 0) (3, 9) (1, 0) .(22) z cd, (9, −2) QNR (5, 3) (11, 4) QNR (2, 2) cd, modG cd, z R (9, −2) na (7, 2) (7, −1) na (2, 2) Therefore, (21) and (22) imply equation x, y2 (3, 8) *** (6, 7) (8, −2) *** (10, 5) cd,,m2z R2 cdod G , (23) which itself implies that (20) is correct. Q.E.D. mN:1 8 dis and od N 716 is an integer. Proof: Since p = 8w + 3 and q = 4r, therefor e 22 3. Criterion of Gaussian Quadratic Nwwr 16 4 3 9 (2). Hence 16N 7 . If we assume that m is even; then Residuosity Where N 5mod8 Nm7 16 12. (27) Proposition 7: Gaussian cd, has a quadratic root Thus, if m 2 is integer, then N 716 is not (27). modulo Gaussian prime pq, only if This contradiction proves Proposition 8. Proposition 9 {criterion of Gaussian quadratic residu- N 14 cd,md1,0o G. (24) osity}: Let Example 1: Consider p91,q 6; N p,8317q , N 18 which is a prime; hence 91, 6 are Gaussian primes. Ecd:, mod G; (28) Compute mN: 1 4/ 2079; zN:3 8 1040 ; Let cd,81,71 . Since and gcdcd , , G 1 . 81,71m 96,85 1,0 mod 91, 6 (11), therefore, Then cd, has a quadratic root modulo Gaussian prime G if xy, 81,71 81,71 1040 0,1 (25) E:1 ,0;0 ,11; i; {see the algorithm below}. 57,75 mod 91, 6 . (29) Verification: Indeed, Proposition 10: Suppose 2 57,75 mod 91, 6 81,71. (26) a) p is odd and q 0mod4 ; (30) 4. Numeric Illustration b) zN 716 ; (31) c) Resolventa R satisfies the following conditions: Consider p = 10, q = −3. Then N = 109; m = 27; z = 14. m In Table 1 cd, are the quartic roots q of unity 1,0 modGE if 1,0 ; (32) k (9), i.e., RGE0, 1 mod if 1,0 ; (33) R:q1 1,0; q2 12,7 1,0 ;q3 3,9 0, 1 ; 3 . EGEmod if 0, 1 ; (34) qp10, 2 0,1 mod ,q 4 Then Step-by-step process of extraction of the square roots cd,,moz R cdd G . (35) and criteria of quadratic residuosity are illustrated for several values of cd, .
Recommended publications
  • Gaussian Prime Labeling of Super Subdivision of Star Graphs
    of Math al em rn a u ti o c J s l A a Int. J. Math. And Appl., 8(4)(2020), 35{39 n n d o i i t t a s n A ISSN: 2347-1557 r e p t p n l I i c • Available Online: http://ijmaa.in/ a t 7 i o 5 n 5 • s 1 - 7 4 I 3 S 2 S : N International Journal of Mathematics And its Applications Gaussian Prime Labeling of Super Subdivision of Star Graphs T. J. Rajesh Kumar1,∗ and Antony Sanoj Jerome2 1 Department of Mathematics, T.K.M College of Engineering, Kollam, Kerala, India. 2 Research Scholar, University College, Thiruvananthapuram, Kerala, India. Abstract: Gaussian integers are the complex numbers of the form a + bi where a; b 2 Z and i2 = −1 and it is denoted by Z[i]. A Gaussian prime labeling on G is a bijection from the vertices of G to [ n], the set of the first n Gaussian integers in the spiral ordering such that if uv 2 E(G), then (u) and (v) are relatively prime. Using the order on the Gaussian integers, we discuss the Gaussian prime labeling of super subdivision of star graphs. MSC: 05C78. Keywords: Gaussian Integers, Gaussian Prime Labeling, Super Subdivision of Graphs. © JS Publication. 1. Introduction The graphs considered in this paper are finite and simple. The terms which are not defined here can be referred from Gallian [1] and West [2]. A labeling or valuation of a graph G is an assignment f of labels to the vertices of G that induces for each edge xy, a label depending upon the vertex labels f(x) and f(y).
    [Show full text]
  • Number Theory Course Notes for MA 341, Spring 2018
    Number Theory Course notes for MA 341, Spring 2018 Jared Weinstein May 2, 2018 Contents 1 Basic properties of the integers 3 1.1 Definitions: Z and Q .......................3 1.2 The well-ordering principle . .5 1.3 The division algorithm . .5 1.4 Running times . .6 1.5 The Euclidean algorithm . .8 1.6 The extended Euclidean algorithm . 10 1.7 Exercises due February 2. 11 2 The unique factorization theorem 12 2.1 Factorization into primes . 12 2.2 The proof that prime factorization is unique . 13 2.3 Valuations . 13 2.4 The rational root theorem . 15 2.5 Pythagorean triples . 16 2.6 Exercises due February 9 . 17 3 Congruences 17 3.1 Definition and basic properties . 17 3.2 Solving Linear Congruences . 18 3.3 The Chinese Remainder Theorem . 19 3.4 Modular Exponentiation . 20 3.5 Exercises due February 16 . 21 1 4 Units modulo m: Fermat's theorem and Euler's theorem 22 4.1 Units . 22 4.2 Powers modulo m ......................... 23 4.3 Fermat's theorem . 24 4.4 The φ function . 25 4.5 Euler's theorem . 26 4.6 Exercises due February 23 . 27 5 Orders and primitive elements 27 5.1 Basic properties of the function ordm .............. 27 5.2 Primitive roots . 28 5.3 The discrete logarithm . 30 5.4 Existence of primitive roots for a prime modulus . 30 5.5 Exercises due March 2 . 32 6 Some cryptographic applications 33 6.1 The basic problem of cryptography . 33 6.2 Ciphers, keys, and one-time pads .
    [Show full text]
  • THE GAUSSIAN INTEGERS Since the Work of Gauss, Number Theorists
    THE GAUSSIAN INTEGERS KEITH CONRAD Since the work of Gauss, number theorists have been interested in analogues of Z where concepts from arithmetic can also be developed. The example we will look at in this handout is the Gaussian integers: Z[i] = fa + bi : a; b 2 Zg: Excluding the last two sections of the handout, the topics we will study are extensions of common properties of the integers. Here is what we will cover in each section: (1) the norm on Z[i] (2) divisibility in Z[i] (3) the division theorem in Z[i] (4) the Euclidean algorithm Z[i] (5) Bezout's theorem in Z[i] (6) unique factorization in Z[i] (7) modular arithmetic in Z[i] (8) applications of Z[i] to the arithmetic of Z (9) primes in Z[i] 1. The Norm In Z, size is measured by the absolute value. In Z[i], we use the norm. Definition 1.1. For α = a + bi 2 Z[i], its norm is the product N(α) = αα = (a + bi)(a − bi) = a2 + b2: For example, N(2 + 7i) = 22 + 72 = 53. For m 2 Z, N(m) = m2. In particular, N(1) = 1. Thinking about a + bi as a complex number, its norm is the square of its usual absolute value: p ja + bij = a2 + b2; N(a + bi) = a2 + b2 = ja + bij2: The reason we prefer to deal with norms on Z[i] instead of absolute values on Z[i] is that norms are integers (rather than square roots), and the divisibility properties of norms in Z will provide important information about divisibility properties in Z[i].
    [Show full text]
  • Intersections of Deleted Digits Cantor Sets with Gaussian Integer Bases
    INTERSECTIONS OF DELETED DIGITS CANTOR SETS WITH GAUSSIAN INTEGER BASES Athesissubmittedinpartialfulfillment of the requirements for the degree of Master of Science By VINCENT T. SHAW B.S., Wright State University, 2017 2020 Wright State University WRIGHT STATE UNIVERSITY SCHOOL OF GRADUATE STUDIES May 1, 2020 I HEREBY RECOMMEND THAT THE THESIS PREPARED UNDER MY SUPER- VISION BY Vincent T. Shaw ENTITLED Intersections of Deleted Digits Cantor Sets with Gaussian Integer Bases BE ACCEPTED IN PARTIAL FULFILLMENT OF THE RE- QUIREMENTS FOR THE DEGREE OF Master of Science. ____________________ Steen Pedersen, Ph.D. Thesis Director ____________________ Ayse Sahin, Ph.D. Department Chair Committee on Final Examination ____________________ Steen Pedersen, Ph.D. ____________________ Qingbo Huang, Ph.D. ____________________ Anthony Evans, Ph.D. ____________________ Barry Milligan, Ph.D. Interim Dean, School of Graduate Studies Abstract Shaw, Vincent T. M.S., Department of Mathematics and Statistics, Wright State University, 2020. Intersections of Deleted Digits Cantor Sets with Gaussian Integer Bases. In this paper, the intersections of deleted digits Cantor sets and their fractal dimensions were analyzed. Previously, it had been shown that for any dimension between 0 and the dimension of the given deleted digits Cantor set of the real number line, a translate of the set could be constructed such that the intersection of the set with the translate would have this dimension. Here, we consider deleted digits Cantor sets of the complex plane with Gaussian integer bases and show that the result still holds. iii Contents 1 Introduction 1 1.1 WhystudyintersectionsofCantorsets? . 1 1.2 Prior work on this problem . 1 2 Negative Base Representations 5 2.1 IntegerRepresentations .............................
    [Show full text]
  • Gaussian Integers
    Gaussian integers 1 Units in Z[i] An element x = a + bi 2 Z[i]; a; b 2 Z is a unit if there exists y = c + di 2 Z[i] such that xy = 1: This implies 1 = jxj2jyj2 = (a2 + b2)(c2 + d2) But a2; b2; c2; d2 are non-negative integers, so we must have 1 = a2 + b2 = c2 + d2: This can happen only if a2 = 1 and b2 = 0 or a2 = 0 and b2 = 1. In the first case we obtain a = ±1; b = 0; thus x = ±1: In the second case, we have a = 0; b = ±1; this yields x = ±i: Since all these four elements are indeed invertible we have proved that U(Z[i]) = {±1; ±ig: 2 Primes in Z[i] An element x 2 Z[i] is prime if it generates a prime ideal, or equivalently, if whenever we can write it as a product x = yz of elements y; z 2 Z[i]; one of them has to be a unit, i.e. y 2 U(Z[i]) or z 2 U(Z[i]): 2.1 Rational primes p in Z[i] If we want to identify which elements of Z[i] are prime, it is natural to start looking at primes p 2 Z and ask if they remain prime when we view them as elements of Z[i]: If p = xy with x = a + bi; y = c + di 2 Z[i] then p2 = jxj2jyj2 = (a2 + b2)(c2 + d2): Like before, a2 + b2 and c2 + d2 are non-negative integers. Since p is prime, the integers that divide p2 are 1; p; p2: Thus there are three possibilities for jxj2 and jyj2 : 1.
    [Show full text]
  • Fermat Test with Gaussian Base and Gaussian Pseudoprimes
    Czechoslovak Mathematical Journal, 65 (140) (2015), 969–982 FERMAT TEST WITH GAUSSIAN BASE AND GAUSSIAN PSEUDOPRIMES José María Grau, Gijón, Antonio M. Oller-Marcén, Zaragoza, Manuel Rodríguez, Lugo, Daniel Sadornil, Santander (Received September 22, 2014) Abstract. The structure of the group (Z/nZ)⋆ and Fermat’s little theorem are the basis for some of the best-known primality testing algorithms. Many related concepts arise: Eu- ler’s totient function and Carmichael’s lambda function, Fermat pseudoprimes, Carmichael and cyclic numbers, Lehmer’s totient problem, Giuga’s conjecture, etc. In this paper, we present and study analogues to some of the previous concepts arising when we consider 2 2 the underlying group Gn := {a + bi ∈ Z[i]/nZ[i]: a + b ≡ 1 (mod n)}. In particular, we characterize Gaussian Carmichael numbers via a Korselt’s criterion and present their relation with Gaussian cyclic numbers. Finally, we present the relation between Gaussian Carmichael number and 1-Williams numbers for numbers n ≡ 3 (mod 4). There are also 18 no known composite numbers less than 10 in this family that are both pseudoprime to base 1 + 2i and 2-pseudoprime. Keywords: Gaussian integer; Fermat test; pseudoprime MSC 2010 : 11A25, 11A51, 11D45 1. Introduction Most of the classical primality tests are based on Fermat’s little theorem: let p be a prime number and let a be an integer such that p ∤ a, then ap−1 ≡ 1 (mod p). This theorem offers a possible way to detect non-primes: if for a certain a coprime to n, an−1 6≡ 1 (mod n), then n is not prime.
    [Show full text]
  • Introduction to Abstract Algebra “Rings First”
    Introduction to Abstract Algebra \Rings First" Bruno Benedetti University of Miami January 2020 Abstract The main purpose of these notes is to understand what Z; Q; R; C are, as well as their polynomial rings. Contents 0 Preliminaries 4 0.1 Injective and Surjective Functions..........................4 0.2 Natural numbers, induction, and Euclid's theorem.................6 0.3 The Euclidean Algorithm and Diophantine Equations............... 12 0.4 From Z and Q to R: The need for geometry..................... 18 0.5 Modular Arithmetics and Divisibility Criteria.................... 23 0.6 *Fermat's little theorem and decimal representation................ 28 0.7 Exercises........................................ 31 1 C-Rings, Fields and Domains 33 1.1 Invertible elements and Fields............................. 34 1.2 Zerodivisors and Domains............................... 36 1.3 Nilpotent elements and reduced C-rings....................... 39 1.4 *Gaussian Integers................................... 39 1.5 Exercises........................................ 41 2 Polynomials 43 2.1 Degree of a polynomial................................. 44 2.2 Euclidean division................................... 46 2.3 Complex conjugation.................................. 50 2.4 Symmetric Polynomials................................ 52 2.5 Exercises........................................ 56 3 Subrings, Homomorphisms, Ideals 57 3.1 Subrings......................................... 57 3.2 Homomorphisms.................................... 58 3.3 Ideals.........................................
    [Show full text]
  • Number-Theoretic Transforms Using Cyclotomic Polynomials
    MATHEMATICS OF COMPUTATION VOLUME 52, NUMBER 185 JANUARY 1989, PAGES 189-200 Parameter Determination for Complex Number-Theoretic Transforms Using Cyclotomic Polynomials By R. Creutzburg and M. Tasche Abstract. Some new results for finding all convenient moduli m for a complex number- theoretic transform with given transform length n and given primitive rath root of unity modulo m are presented. The main result is based on the prime factorization for values of cyclotomic polynomials in the ring of Gaussian integers. 1. Introduction. With the rapid advances in large-scale integration, a growing number of digital signal processing applications becomes attractive. The number- theoretic transform (NTT) was introduced as a generalization of the discrete Fourier transform (DFT) over residue class rings of integers in order to perform fast cyclic convolutions without roundoff errors [7, pp. 158-167], [10, pp. 211-216], [3]. The main drawback of the NTT is the rigid relationship between obtainable transform length and possible computer word length. In a recent paper [4], the authors have discussed this important problem of parameter determination for NTT's in the ring of integers by studying cyclotomic polynomials. The advantage of the later introduced (see [7, pp. 210-216], [9], [10, pp. 236-239], [5]) complex number-theoretic transforms (CNT) over the corresponding rational transforms is that the transform length is larger for the same modulus. In this note, we consider the problem of parameter determination for CNT, and we extend the results of [4] to the ring of Gaussian integers. 2. Primitive Roots of Unity Modulo m. By Z and I[i] we denote the ring of integers and the ring of Gaussian integers, respectively.
    [Show full text]
  • GAUSSIAN INTEGERS 1. Basic Definitions a Gaussian Integer Is a Complex Number Z = X + Yi for Which X and Y, Called Respectively
    GAUSSIAN INTEGERS 1. Basic Definitions A Gaussian integer is a complex number z = x + yi for which x and y, called respectively the real and imaginary parts of z, are integers. In particular, since either or both of x and y are allowed to be 0, every ordinary integer is also a Gaussian integer. We recall that the complex conjugate of z is defined by z = x iy and satisfies, for arbitrary complex numbers z and w, z + w = z−+ w and zw = zw. We remark that sums, products, and complex conjugates of Gaussian Integers are again Gaussian integers. For any complex number z, we define the norm of z by N(z) = zz = x2 +y2, where x and y are the respectively the real and imaginary parts of z. It follows that N(zw) = N(z)N(w). We remark that the norm of any complex number is a non-negative real number, the norm of a Gaussian integer is a non-negative integer, and only 0 has norm 0. We observe further that only 1 and i have norm 1. These are called unit Gaussian integers, or± units, and± two Gaussian integers are called associates if they can be obtained from one another by multiplication by units. Note that, in general, z and its associates are distinct from z and its associates. The exceptions to this rule occur when the real and imaginary parts of z have the same absolute value, and when the real or imaginary part of z is 0. We defined divisibility for the Gaussian integers exactly as for inte- gers.
    [Show full text]
  • A Concise Introduction to the Theory of Numbers
    A concise introduction to the theory of numbers ALAN BAKER Professor of Pure Mathematics in the University of Cambtidge CAMBRIDGE UNIVERSITY PRESS Cambrfdge London New York New Rochelle Melbourne Sydney Contents Published by the Press Syndicate of the University of Cambridge Preface The Pitt Building, Trumpington Street, Cambridge CB2 1RP 32 East 57th Street, New York, NY 10022, USA Introduction: Gauss and number theoty 296 Beaconsfield Parade, Middle Park, Melbourne 3206, Australia Divisibility @ Cambridge University Press 1984 Foundations Division algorithm First published 1984 Greatest common divisor Euclid's algorithm Printed in Great Britain by J. W. Arrowsmith Ltd., Bristol BS3 2NT Fundamental theorem Properties of the primes Library of Congress catalogue card number: 84-1911 Further reading Exercises British Litnuty cataloguing in publication data Baker, Alan Arithmetical functions A concise introduction to the theory of The function [x] numbers Multiplicative functions 1. Numbers, Theory of Euler's (totient) function 4(n) I. Title The Miibius function p(n) 5W.7 QA241 The functions ~(n)and u(n) ISBN 0 521 24383 1 hard covers Average orders ISBN 0 521 28654 9 paperback Perfect numbers The RCemann zeta-function Further reading Exercises Congruences Definitions Chinese remainder theorem The theorems of Fermat and Euler AS. Wilson's theorem Contents vii Contents Lagrange's theorem 6 The Gaussian field Primitive roots 7 Further reading Indices 8 Exercises Further reading Exercises Diophantine equations The Pel1 equation Quadratic residues
    [Show full text]
  • Introducing Quaternions to Integer Factorisation
    Journal of Physical Science and Application 5 (2) (2015) 101-107 doi: 10.17265/2159-5348/2015.02.003 D DAVID PUBLISHING Introducing Quaternions to Integer Factorisation HuiKang Tong 4500 Ang Mo Kio Avenue 6, 569843, Singapore Abstract: The key purpose of this paper is to open up the concepts of the sum of four squares and the algebra of quaternions into the attempts of factoring semiprimes, the product of two prime numbers. However, the application of these concepts here has been clumsy, and would be better explored by those with a more rigorous mathematical background. There may be real immediate implications on some RSA numbers that are slightly larger than a perfect square. Key words: Integer factorisation, RSA, quaternions, sum of four squares, euler factorisation method. Nomenclature In Section 3, we extend the Euler factoring method to one using the sum of four squares and the algebra p, q: prime factors n: semiprime pq, the product of two primes of quaternions. We comment on the development of P: quaternion with norm p the mathematics in Section 3.1, and introduce the a, b, c, d: components of a quaternion integral quaternions in Section 3.2, and its relationship 1. Introduction with the sum of four squares in Section 3.3. In Section 3.4, we mention an algorithm to generate the sum of We assume that the reader know the RSA four squares. cryptosystem [1]. Notably, the ability to factorise a In Section 4, we propose the usage of concepts of random and large semiprime n (the product of two the algebra of quaternions into the factorisation of prime numbers p and q) efficiently can completely semiprimes.
    [Show full text]
  • 25 Primes in Arithmetic Progression
    b2530 International Strategic Relations and China’s National Security: World at the Crossroads This page intentionally left blank b2530_FM.indd 6 01-Sep-16 11:03:06 AM Published by World Scientific Publishing Co. Pte. Ltd. 5 Toh Tuck Link, Singapore 596224 SA office: 27 Warren Street, Suite 401-402, Hackensack, NJ 07601 K office: 57 Shelton Street, Covent Garden, London WC2H 9HE Library of Congress Cataloging-in-Publication Data Names: Ribenboim, Paulo. Title: Prime numbers, friends who give problems : a trialogue with Papa Paulo / by Paulo Ribenboim (Queen’s niversity, Canada). Description: New Jersey : World Scientific, 2016. | Includes indexes. Identifiers: LCCN 2016020705| ISBN 9789814725804 (hardcover : alk. paper) | ISBN 9789814725811 (softcover : alk. paper) Subjects: LCSH: Numbers, Prime. Classification: LCC QA246 .R474 2016 | DDC 512.7/23--dc23 LC record available at https://lccn.loc.gov/2016020705 British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library. Copyright © 2017 by World Scientific Publishing Co. Pte. Ltd. All rights reserved. This book, or parts thereof, may not be reproduced in any form or by any means, electronic or mechanical, including photocopying, recording or any information storage and retrieval system now known or to be invented, without written permission from the publisher. For photocopying of material in this volume, please pay a copying fee through the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, SA. In this case permission to photocopy is not required from the publisher. Typeset by Stallion Press Email: [email protected] Printed in Singapore YingOi - Prime Numbers, Friends Who Give Problems.indd 1 22-08-16 9:11:29 AM October 4, 2016 8:36 Prime Numbers, Friends Who Give Problems 9in x 6in b2394-fm page v Qu’on ne me dise pas que je n’ai rien dit de nouveau; la disposition des mati`eres est nouvelle.
    [Show full text]